• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 209
  • 30
  • 30
  • 28
  • 22
  • 20
  • 6
  • 6
  • 6
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • Tagged with
  • 480
  • 140
  • 115
  • 65
  • 59
  • 56
  • 51
  • 51
  • 50
  • 48
  • 42
  • 40
  • 38
  • 37
  • 36
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
111

A new fractional-order chaotic system with its analysis, synchronization, and circuit realization for secure communication applications

Rahman, Z.S.A., Jasim, B.H., Al-Yasir, Yasir I.A., Hu, Yim Fun, Abd-Alhameed, Raed, Alhasnawi, B.N. 12 November 2021 (has links)
Yes / This article presents a novel four-dimensional autonomous fractional-order chaotic system (FOCS) with multi-nonlinearity terms. Several dynamics, such as the chaotic attractors, equilibrium points, fractal dimension, Lyapunov exponent, and bifurcation diagrams of this new FOCS, are studied analytically and numerically. Adaptive control laws are derived based on Lyapunov theory to achieve chaos synchronization between two identical new FOCSs with an uncertain parameter. For these two identical FOCSs, one represents the master and the other is the slave. The uncertain parameter in the slave side was estimated corresponding to the equivalent master parameter. Next, this FOCS and its synchronization were realized by a feasible electronic circuit and tested using Multisim software. In addition, a microcontroller (Arduino Due) was used to implement the sug-gested system and the developed synchronization technique to demonstrate its digital applicability in real-world applications. Furthermore, based on the developed synchronization mechanism, a secure communication scheme was constructed. Finally, the security analysis metric tests were investigated through histograms and spectrograms analysis to confirm the security strength of the employed communication system. Numerical simulations demonstrate the validity and possibility of using this new FOCS in high-level security communication systems. Furthermore, the secure communication system is highly resistant to pirate attacks. A good agreement between simulation and experimental results is obtained, showing that the new FOCS can be used in real-world applications.
112

Secure device-to-device communication in LTE-A

Alam, M., Yang, D., Rodriguez, Jonathan, Abd-Alhameed, Raed 04 1900 (has links)
No / Enabling D2D communications over LTE-A networks can provide many benefits in terms of throughput, energy consumption, traffic load, and so on. It also enables new commercial services such as location-based advertising. For these reasons, D2D communications has become a hot topic in both the academic and industrial communities. However, many research works are focused on node discovery, radio resource management, and other aspects, while the issue of security is less addressed. In this article, we intend to provide an overview of the security architecture, threads, and requirements. Based on these requirements, we propose several potential solutions by reusing the existing security mechanisms. Promising topics related to secure D2D communications for future research are also discussed.
113

L'intervention du juge dans la mise en oeuvre des sûretés réelles par le créancier dans le droit civil vietnamien / The intervention of the judge into the course of processing security transaction in Vietnamese civil law.

Doan, Thi Phuong Diep 03 December 2012 (has links)
Les sûretés réelles jouent un rôle indispensable dans la vie civile ainsi que dans la vie économique d`un pays. Ces transactions amènent inéluctablement la disposition du bien garanti en cas d`insolvabilité du débiteur. Au Vietnam, presque toutes les sûretés accompagnent le prêt de consommation (les autres obligations telles que l`obligation de paiement née d`un contrat de vente sont rarement garanties en réalité). Cependant, dans la relation entre le prêteur et l`emprunteur, ce dernier est toujours dans une position plus faible que le premier parce que le prêteur est toujours dans la situation de besoin d`argent, même urgent. Cette différence du contrat de prêt influence de manière appréciable non seulement le contrat de sûreté accompagnée mais aussi la disposition du bien garanti. Bien que la mise en œuvre du bien garanti joue un rôle très important à l`égard des parties de la sûreté ainsi que les tiers concernés, elle n`est pas disposée clairement et officiellement par la voie législative selon le droit vietnamien. Cela veut dire que ce domaine n`est réglé que par le pouvoir administratif. En plus, dans la circonstance juridique du Vietnam actuelle, les parties de la sûreté peuvent convenir librement du mode de disposition du bien garanti en cas d`insolvabilité du débiteur. La loi ne prévoit aucune intervention afin de contrôler ce processus de la mise en œuvre du bien, cette situation est très dangereuse car la disposition du bien concerne non seulement les doits des parties mais aussi ceux des tiers. Afin de protéger le débiteur devant le créancier dans la négociation le contrat de sûreté, les tiers concernés devant la possibilité d`une disposition « amitié » du bien garanti entre le créancier et le débiteur, on a besoin d`une intervention judiciaire en tant qu`un mécanisme « neutre » avec le pouvoir étatique nécessaire. Cette intervention existe déjà en réalité mais sous forme facultative, donc elle n`est pas effective en jouant le rôle du gardien de la justice. A côté des droits du débiteur ainsi que des tiers concernés, les droits du créancier dans le contrat de sûreté sont appréciables, notamment en cas d`un débiteur de mauvais foi, l`intervention du juge et après cela, une garantie du pouvoir judiciaire dans l`exécution du jugement rendra utile le créancier garanti. Avec toutes les raisons ci-dessus, une intervention du juge dans la mise en œuvre du bien garanti est nécessairement traitée par la thèse. Cet étude traitera des dispositions du droit ainsi que de la situation réelle du Vietnam dans la réalisation du bien garanti, les avantages ainsi que les inconvénients dans l`exécution des dispositions du droit vietnamiens. C`est à partir de ces analyses que nous essayerons de construire un mécanisme juridique pour que les activités des parties concernées à la mise en œuvre du bien garanti puissent être effectuées de manière la plus favorable et la plus juste possible. / The measures to secure of property (in which the borrower pledges or mortgage some asset as collateral for the loan) play an important role in a country’s civilian and economic life. These secured debt agreements necessarily results in the sequestration of the possession of the asset used as collateral in case the borrower defaults. In Viet Nam, almost all measures to secure are warranted by a contractual agreement that documents the debtor’s duty to pay off the debt (Other categories of debt such as sale agreement are rarely secured). In reality, in any loan agreement, the debtors, being in usually-urgent need for money, are always on the dependent and disadvantaged side in negotiating with the creditor. This unequal negotiation advantage in loan agreement greatly impacts not only how the security is put in the loan but also how it is sequestrated to regain some or all of the amount originally lent to the borrower. Although the treatment of loan security in a secured loan agreement is vital to both parties as well as the third party, it is not formally and thoroughly addressed in law but only administered by the regulations issued by state management bodies. In Viet Nam nowadays, it is a practice in secured loan agreements that the two parties are free to negotiate how the collateral for the loan is treated in the event that the debt is not properly repaid. The legislation does not anticipate any forms or judicial intervention for the measure to secure processing in order to better control this category of secured debt. This freedom in settling measure to secure poses many financial risks as it affects not only the two direct parties of the security transaction but also the third party who is a “bona fide”. In order to protect the rights of the debtors who are on the inferior side in measure to secure negotiation and the third party who faces the possible trick arranged by the debtor and creditor in handling the loan security asset, it is crucial to establish a state-level judicial intervention mechanism to be employed in processing the measure to secure. In fact, this form of intervention exists but only on an on-request basis, and therefore fails to guarantee full protective efficiency in functioning as a legal protector. Besides the rights of the debtor and the third party, the rights of the creditor also need attending to by the legislators. Especially when the debtor is dishonest, the judicial intervention in this case, and then the participation of the executive bodies will be very helpful to the creditor. With all the above mentioned reasons, the intervention of the judge, representative of the judicial bodies, into the course of processing security transaction, need researching by the thesis. The thesis researches the legal regulations and the practice of handling security transaction in Viet Nam, as well the advantages and disadvantages in executing these regulations. Based on the analytical findings, a recommendation is made on establishing a legal mechanism to be applied in the treatment of measure to security so that the subject’s activities in this area can be conducted in the best convenient and reasonable manner.
114

Hardware Security through Design Obfuscation

Chakraborty, Rajat Subhra 04 May 2010 (has links)
No description available.
115

Lattice Codes for Secure Communication and Secret Key Generation

Vatedka, Shashank January 2017 (has links) (PDF)
In this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via an honest-but-curious bidirectional relay. There is no direct link between the user nodes, and all communication must take place through the relay. The relay behaves like a passive eavesdropper, but otherwise follows the protocol it is assigned. Our objective is to design a scheme where the user nodes can reliably exchange messages such that the relay gets no information about the individual messages. We first describe a perfectly secure scheme using nested lattices, and show that our scheme achieves secrecy regardless of the distribution of the additive noise, and even if this distribution is unknown to the user nodes. Our scheme is explicit, in the sense that for any pair of nested lattices, we give the distribution used for randomization at the encoders to guarantee security. We then give a strongly secure lattice coding scheme, and we characterize the performance of both these schemes in the presence of Gaussian noise. We then extend our perfectly-secure and strongly-secure schemes to obtain a protocol that guarantees end-to-end secrecy in a multichip line network. We also briefly study the robustness of our bidirectional relaying schemes to channel imperfections. In the second problem, we consider the scenario where multiple terminals have access to private correlated Gaussian sources and a public noiseless communication channel. The objective is to generate a group secret key using their sources and public communication in a way that an eavesdropper having access to the public communication can obtain no information about the key. We give a nested lattice-based protocol for generating strongly secure secret keys from independent and identically distributed copies of the correlated random variables. Under certain assumptions on the joint distribution of the sources, we derive achievable secret key rates. The tools used in designing protocols for both these problems are nested lattice codes, which have been widely used in several problems of communication and security. In this thesis, we also study lattice constructions that permit polynomial-time encoding and decoding. In this regard, we first look at a class of lattices obtained from low-density parity-check (LDPC) codes, called Low-density Construction-A (LDA) lattices. We show that high-dimensional LDA lattices have several “goodness” properties that are desirable in many problems of communication and security. We also present a new class of low-complexity lattice coding schemes that achieve the capacity of the AWGN channel. Codes in this class are obtained by concatenating an inner Construction-A lattice code with an outer Reed-Solomon code or an expander code. We show that this class of codes can achieve the capacity of the AWGN channel with polynomial encoding and decoding complexities. Furthermore, the probability of error decays exponentially in the block length for a fixed transmission rate R that is strictly less than the capacity. To the best of our knowledge, this is the first capacity-achieving coding scheme for the AWGN channel which has an exponentially decaying probability of error and polynomial encoding/decoding complexities.
116

Efficient and Secure Equality-based Two-party Computation

Javad Darivandpour (11190051) 27 July 2021 (has links)
<div>Multiparty computation refers to a scenario in which multiple distinct yet connected parties aim to jointly compute a functionality. Over recent decades, with the rapid spread of the internet and digital technologies, multiparty computation has become an increasingly important topic. In addition to the integrity of computation in such scenarios, it is essential to ensure that the privacy of sensitive information is not violated. Thus, secure multiparty computation aims to provide sound approaches for the joint computation of desired functionalities in a secure manner: Not only must the integrity of computation be guaranteed, but also each party must not learn anything about the other parties' private data. In other words, each party learns no more than what can be inferred from its own input and its prescribed output.</div><div><br></div><div> This thesis considers secure two-party computation over arithmetic circuits based on additive secret sharing. In particular, we focus on efficient and secure solutions for fundamental functionalities that depend on the equality of private comparands. The first direction we take is providing efficient protocols for two major problems of interest. Specifically, we give novel and efficient solutions for <i>private equality testing</i> and multiple variants of <i>secure wildcard pattern matching</i> over any arbitrary finite alphabet. These problems are of vital importance: Private equality testing is a basic building block in many secure multiparty protocols; and, secure pattern matching is frequently used in various data-sensitive domains, including (but not limited to) private information retrieval and healthcare-related data analysis. The second direction we take towards a performance improvement in equality-based secure two-party computation is via introducing a generic functionality-independent secure preprocessing that results in an overall computation and communication cost reduction for any subsequent protocol. We achieve this by providing the first precise functionality formulation and secure protocols for replacing original inputs with much smaller inputs such that this replacement neither changes the outcome of subsequent computations nor violates the privacy of sensitive inputs. Moreover, our input-size reduction opens the door to a new approach for efficiently solving Private Set Intersection. The protocols we give in this thesis are typically secure in the semi-honest adversarial threat model.</div>
117

Feasibility, Efficiency, and Robustness of Secure Computation

Hai H Nguyen (14206922) 02 December 2022 (has links)
<p>Secure computation allows mutually distrusting parties to compute over private data. Such collaborations have widespread applications in social, scientific, commercial, and security domains. However, the overhead of achieving security is a major bottleneck to the adoption of such technologies. In this context, this thesis aims to design the most secure protocol within budgeted computational or network resources by mathematically formulating it as an optimization problem. </p> <p>With the rise in CPU power and cheap RAM, the offline-online model for secure computation has become the prominent model for real-world security systems. This thesis investigates the above-mentioned optimization problem in the information-theoretic offline-online model. In particular, this thesis presents the following selected sample of our research in greater detail. </p> <p>Round and Communication Complexity: Chor-Kushilevitz-Beaver characterized the round and communication complexity of secure two-party computation. Since then, the case of functions with randomized output remained unexplored. We proved the decidability of determining these complexities. Next, if such a protocol exists, we construct the optimal protocol; otherwise, we present an obstruction to achieving security. </p> <p>Rate and Capacity of secure computation: The efficiency of converting the offline samples into secure computation during the online phase is essential. However, investigating this ``production rate'' for general secure computations seems analytically intractable. Towards this objective, we introduce a new model of secure computation -- one without any communication -- that has several practical applications. We lay the mathematical foundations of formulating rate and capacity questions in this framework. Our research identifies the first tight rate and capacity results (a la Shannon) in secure computation. </p> <p>Reverse multiplication embedding: We identify a new problem in algebraic complexity theory that unifies several efficiency objectives in cryptography. Reverse multiplication embedding seeks to implement as many (base field) multiplications as possible using one extension field multiplication. We present optimal construction using algebraic function fields. This embedding has subsequently led to efficient improvement of secure computation, homomorphic encryption, proof systems, and leakage-resilient cryptography. </p> <p>Characterizing the robustness to side-channel attacks: Side-channel attacks present a significant threat to the offline phase. We introduce the cryptographic analog of common information to characterize the offline phase's robustness quantitatively. We build a framework for security and attack analysis. In the context of robust threshold cryptography, we present a state-of-the-art attack, threat assessment, and security fix for Shamir's secret-sharing. </p> <p><br></p>
118

A Security and Privacy Audit of KakaoTalk’s End-to-End Encryption

Schmidt, Dawin January 2016 (has links)
End-to-end encryption is becoming a standard feature in popular mobile chat appli-cations (apps) with millions of users. In the two years a number of leading chat apps have added end-end encryption features including LINE, KakaoTalk, Viber, Facebook Messenger, and WhatsApp.However, most of these apps are closed-source and there is little to no independent ver-ification of their end-to-end encryption system design. These implementations may be a major concern as proprietary chat apps may make use of non-standard cryptographic algorithms that may not follow cryptography and security best practices. In addition, governments authorities may force chat app providers to add easily decryptable export-grade cryptography to their products. Further, mainstream apps have a large attack surface as they offer a variety of features. As a result, there may be software vulnera-bilities that could be exploited by an attacker in order to compromise user’s end-to-end privacy. Another problem is that, despite being closed-source software, providers often market their apps as being so secure that even the provider is not able to decrypt messages. These marketing claims may be potentially misleading as most users do not have the technical knowledge to verify them.In this Master’s thesis we use KakaoTalk – the most popular chat app in South Korea – as a case study to perform a security and privacy assessment and audit of its “Secure Chat” opt-in end-to-end encryption feature. Also, we examine KakaoTalk’s Terms of Service policies to verify claims such as “[. . . ] Kakao’s server is unable to decrypt the encryption [. . . ]” from a technical perspective.The main goal of this work is to show how various issues in a product can add up to the potential for serious attack vectors against end-to-end privacy despite there being multiple layers of security. In particular, we show how a central public-key directory server makes the end-to-end encryption system vulnerable to well-known operator-site man-in-the-middle attacks. While this naive attack may seem obvious, we argue that (KakaoTalk) users should know about the strength and weaknesses of a particular design in order to make an informed decision whether to trust the security of a chat app or not. / End-to-end kryptering är en allt mer vanligt förekommande funktionalitet bland populära mobila chatttjänster (händanefter appar) med miljontals användare. Under de två senaste åren har många ledande chattappar, bland annat LINE, KakaoTalk, Viber, Facebook Messenger, och WhatsApp, börjat använda end-to-end kryptering. Dock så är de flesta av dessa appar closed-source och det finns begränsad, eller ingen, fristående granskning av systemdesignen för deras end-to-end kryptering. Dessa implementationer kan innebära en stor risk då proprietära chattappar kan använda sig av kryptografiska algoritmer som inte följer best practice för säkerhet eller kryptografi. Vidare så kan statliga myndigheter tvinga de som tillhandahåller chattappar att använda lättdekrypterad export-grade kryptografi för sina produkter. Lägg till det att de flesta vanliga appar har många ytor som kan attackeras, till följd av all funktionalitet de erbjuder. Som ett resultat av detta finns en risk för mjukvarubrister som kan utnyttjas av en hackare för att inkräkta på en användares end-to-end integritet. Ytterligare ett problem är att trots att det är closed-source mjukvara så marknadsför ofta appleverantörerna sina appar som att vara är så säkra att inte ens leverantörerna själva kan dekryptera användarnas meddelanden. Det som hävdas i marknadsföringen riskerar vara missledande eftersom de flesta användarna inte har den tekniska kunskap som krävs för att kunna verifiera att det som hävdas är sant. I den här Master-uppsatsen använder vi KakaoTalk – den mest populära chattappen i Sydkorea – som en fallstudie för att granska och bedömma säkerhetens- och integritets-aspekterna hos deras valbara “Secure Chat” med end-to-end krypteringsfunktionalitet. Vi granskar även KakaoTalk’s användarvillkor för att kunna verifiera påståenden som att “[. . . ] Kakao’s server is unable to decrypt the encryption [. . . ]” från ett tekniskt perspektiv. Det huvudsakliga syftet med denna studien är att belysa hur olika brister i en produkt sammantagna kan skapa en risk för allvarliga vektorattacker mot end-to-end integriteten även fast det finns flera skyddslager. Mer specifikt visar vi hur en central katalogserver för public-keys gör end-to-end krypteringssystemet sårbart mot välkända operator-site man-in-the-middle-attacker. Trots att denna naiva typ av attack kan verka uppenbar, argumenterar vi för att (KakaoTalk) användare borde veta om styrkorna och svagheterna med en särskild systemdesign för att kunna göra ett informerat val för om de ska lita på säkerheten hos en chattapplikation eller inte.
119

Felsökning av nätverksenheter : En metod för effektivare felsökning av Cisco Nexus 3000 switch / Network device troubleshooting : A method for more efficient troubleshooting of Cisco Nexus 3000 switch

Khajo, Aboud, Razai, Mattias January 2024 (has links)
Denna rapport syftar till att hitta en metod för effektivare felsökning av Cisco Nexus 3000 switchar. Företag utvecklas ständigt och behovet av flera nätverksenheter ökar, dock har metoder för felsökningen av nätverksenheter inte standardiserats. Den gamla metoden genom kommandorad där enskilda nätverksenheter granskas en i taget är inte längre lämplig i dagens IT-företag när antalet nätverksenheter uppgår till flera tiotusen. Rapporten görs i samarbete med IT-företaget Conscia.  Metoden baseras på en simulering och en testuppkoppling med hjälp av nätverkshanteringsprotokollet NETCONF genom Python-biblioteket Ncclient. Resultatet bestod av flera parametrar och faktorer som kan indikera en förändring i nätverksenheten. Detta har resulterat i en metod som ger information om olika parametervärden och faktorer, vilket ger nätverksadministratören en klarare bild kring switchens tillstånd. Metoden har lett till effektivare felsökning av Cisco Nexus 3000 vid inträffandet av nätverksincidenter. / This report aims to find a method for more efficient troubleshooting of Cisco Nexus 3000 switches. Companies are constantly developing and the need for multiple network devices is increasing, however, methods for troubleshooting network devices have not been standardized. The old method through the command line interface where individual network devices are reviewed one at a time is no longer suitable in today's IT companies when the number of network devices amounts to several tens of thousands. The report is made in collaboration with the IT company Conscia. The method is based on a simulation and a test connection using the network management protocol NETCONF through the Python library Ncclient. The result consisted of several parameters and factors that may indicate a change in the network device. This has resulted in a method that provides information on various parameter values and factors, which gives the network administrator a clearer picture of the state of the switch. The method has led to more efficient troubleshooting of the Cisco Nexus 3000 when network incidents occur.
120

SATELLITE GROUND STATION SECURITY USING SSH TUNNELING

Mauldin, Kendall 10 1900 (has links)
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada / As more satellite ground station systems use the Internet as a means of connectivity, the security of the ground stations and data transferred between stations becomes a growing concern. Possible solutions include software-level password authentication, link encryption, IP filtering, and several others. Many of these methods are being implemented in many different applications. SSH (Secure Shell) tunneling is one specific method that ensures a highly encrypted data link between computers on the Internet. It is used every day by individuals and organizations that want to ensure the security of the data they are transferring over the Internet. This paper describes the security requirements of a specific example of a ground station network, how SSH can be implemented into the existing system, software configuration, and operational testing of the revised ground network.

Page generated in 0.0415 seconds